Cloud Security Reference
Cloud Security Reference
Introduction
Cloud security deals with the processes, policies, resources, and technologies involved in keeping
cloud computing architectures protected from cybersecurity threats and risks. Effective cloud
security measures aim to keep cloud data, applications, and services shielded against new and
existing threats via proper controls and solutions. Cloud security can be achieved via the shared
responsibility model, wherein both cloud service providers (CSPs) and cloud customers have their
own aspects that they would need to manage and secure.
Cloud Deployment Model
1. Public Cloud:
Public clouds are available to the general public, and data are created and stored on third-party
servers.
Server infrastructure belongs to service providers that manage it and administer pool resources,
which is why there is no need for user companies to buy and maintain their own hardware. Provider
companies offer resources as a service both free of charge or on a pay-per-use basis via the Internet.
Users can scale resources as required.
The public cloud deployment model is the first choice for businesses with low privacy concerns.
For example: Amazon Elastic Compute Cloud (Amazon EC2 — the top service provider according
to ZDNet), Microsoft Azure, Google App Engine, IBM Cloud, Salesforce Heroku and others.
2. Private Cloud
A company owns a private cloud as their architectures are very similar of a public cloud.
The server can be hosted externally or on the premises of the owner company. Regardless of their
physical location, these infrastructures are maintained on a designated private network and use
software and hardware that are intended for use only by the owner company.
A clearly defined scope of people have access to the information kept in a private repository, which
prevents the general public from using it. In light of numerous breaches in recent years, a growing
number of large corporations has decided on a closed private cloud model, as this minimizes data
security issues.
Compared to the public model, the private cloud provides wider opportunities for customizing the
infrastructure to the company’s requirements. A private model is especially suitable for companies
that seek to safeguard their mission-critical operations or for businesses with constantly changing
requirements.
Multiple public cloud service providers, including Amazon, IBM, Cisco, Dell and Red Hat, also
provide private solutions.
Advantages:
Flexible development and high scalability, which allows companies to customize their
infrastructures in accordance with their requirements
High security, privacy and reliability, as only authorized persons can access resources
Disadvanatages:
The major disadvantage of the private cloud deployment model is its cost, as it requires
considerable expense on hardware, software and staff training. That is why this secure and flexible
computing deployment model is not the right choice for small companies.
3. Community Cloud
A community deployment model largely resembles the private one; the only difference is the set of
users. Whereas only one company owns the private cloud server, several organizations with similar
backgrounds share the infrastructure and related resources of a community cloud.
If all the participating organizations have uniform security, privacy and performance requirements,
this multi-tenant data center architecture helps these companies enhance their efficiency, as in the
case of joint projects. A centralized cloud facilitates project development, management and
implementation. The costs are shared by all users.
Advantages:
Cost reduction
Improved security, privacy and reliability
Ease of data sharing and collaboration
Disadvantages:
4. Hybrid Cloud
A hybrid cloud encompasses the best features of the abovementioned deployment models (public,
private and community). It allows companies to mix and match the facets of the three types that best
suit their requirements.
A company can balance its load by locating mission-critical workloads on a secure private cloud
and deploying less sensitive ones to a public one. The hybrid cloud deployment model not only
safeguards and controls strategically important assets but does so in a cost- and resource-effective
way. This approach facilitates data and application portability.
Advantages:
Cloud computing services offer shared resources such as servers, databases, and networks via the
internet. Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service
(PaaS) are the three service models of cloud computing, each built to address specific business
requirements.
IaaS:
Security Concerns
Availability - Ensures that authorized users have reliable and timely access to data.
AAA - The security framework for an information system should provide authentication
capabilities. Auditing assesses the effectiveness of security mechanisms.
Primary goals are: Authentication, Authorization, and Auditing.
Authentication - Is a process to ensure that user’s credentials are genuine. It ensures that no
illegitimate access is allowed. A special method for authentication is
Multi-factor authentication.
Trusted Computing Base (TCB) - Defines boundary between security-critical and non-critical
parts of an information system. TCB of an information system is the set of all components that are
critical to its security. Vulnerabilities occurring inside the TCB might jeopardize the security of the
entire system.
Primary goals are: Careful design and implementation of a system’s TCB can significantly improve
its overall security.
Encryption - It is the process of converting data to a form which cannot be used in any
meaningful way without special knowledge.
- The unencrypted data is called Cleartext or Plaintext. The encrypted data is called
Ciphertext.
Decryption is the process of converting the encrypted data back to its original form is called
decryption.
* Keys for encryption and decryption can be the same (Symmetric-Data) or different
(Asymmetric-Web browser, Web Server, VPN, Symmetric Key Transmission).
Defense-in-Depth - “A mechanism which uses multiple security measures, to reduce the risk of
security threats if one component of the protection gets compromised”.
Primary goals are: Physical Security, Remote Access Control, Network Security, Computer
Security, Storage Security.
Ex: Antivirus software installed on individual VM when there is already a Virus protection on the
firewalls within same environment.
Different security products from multiple vendors may be deployed to defend different potential
vulnerable resources within the network.
However, the overall cost of deploying defense-in-depth is often higher, compared to single layered
security mechanisms.
a. Explain the security concepts in Cloud Deployment models (Public, Private, Community,
Hyberid).
b. Illustrate the security concepts in Cloud Service models (IaaS, PaaS, SaaS).
c. Demonstrate the X.509 certificate generation and usage with Banking system interactions.
b. Explain the operations for the VM backup and recovery system with neat diagram.
a. Classify the classes of Virtual Machine Vulnerabilities and its prevention techniques.